Category

Hacking

Hacking Page 2

Free Decryptor BlackByte Ransomware cybersecurity anti malware anti phishing scams malware detection

Free Decryptor for BlackByte Ransomware was released

Previous cyberattack victims of known ransomware BlackByte can rejoice since a free decryptor has been released to the public. If the decryptor is executed, ransomware will generate an original encryption key per file or a key per machine called session keys utilized to encrypt a target’s device.  These keys are then encrypted with a public Rivest–Shamir–Adleman key and attached to the end...
Continue Reading
Non fungible token Malicious NFT OpenSea Marketplace bug cryptocurrency digital-wallets fraud alert fraud-detection

Malicious NFT could have infiltrated OpenSea Marketplace via discovered bug

Currently, the OpenSea marketplace is at risk of being infiltrated by threat actors. Uploading malicious non-fungible tokens or NFT can become a transmitter for hackers attempting to heist digital wallet funds.  Severe security issues inside the OpenSea non-fungible token marketplace that enabled attackers to gather cryptocurrency wallet funds have been patched.  Meanwhile, the non-fungible tokens, also known as NFT, are digitally owned...
Continue Reading
Russia REvil Ransomware TOR sites compromised dark web the onion router

Russia’s REvil Ransomware halts operation as their TOR sites were compromised

REvil ransomware group, Russia’s most notorious cybercriminal gang, known for their extortions, has shut down again after an unidentified individual hijacked their data leak blog and the onion router payment portal.  The ‘The onion router’ shuts down recently. A malicious actor associated with the REvil group announces that somebody caused problems to the ransomware group’s domain to the XSS...
Continue Reading
Threat actors hack account Telegram bots OTP Stealing

Threat actors hack into victims’ accounts via Telegram bots that steal OTPs 

Illegal services that allow threat actors to evade the protection that two-factor authentication (2FA) brings are rampant in underground forums.  While 2FA is the most helpful method of protecting a user’s privacy against criminals hacking into their accounts, threat actors have also found a way to sidestep the protection. One of these is the usage of bots...
Continue Reading
Ransomware CIS 2021 BigBobRoss CryptConsole Cryakl Phobos CrySIS

Ransomware strains that targeted the CIS for 2021

This year has been challenging for businesses, especially with the pandemic outbreak. Several threat actors have taken advantage of executing cyberattacks against organizations worldwide, ransomware being the most common type. System of government such as the Commonwealth of Independent States (CIS) also failed to avoid such unfortunate occurrences of attacks for this year.     Businesses that operate inside the CIS have been the targets of non-prevalent ransomware threat groups.    Described below is...
Continue Reading
Ethernet cables data exfiltration air gapped systems malware

Ethernet cables are being used in a newfound data exfiltration mechanism against air-gapped systems

The latest research has found a new data exfiltration mechanism that utilizes Ethernet cables as a transmitting antenna tool in siphoning sensitive data furtively from air-gapped systems. A security analyst stated that it is an interesting concern how the wires that are supposed to protect air-gap systems become the cause of vulnerability in attacks.  This new data exfiltration mechanism called “LANtenna Attack” allows malicious codes found in...
Continue Reading
Luxury department store Neiman Marcus data breach compromised data

Luxury department store, Neiman Marcus, gets hit by data breach affecting millions

Neiman Marcus, an American luxury department store chain in the ownership of Neiman Marcus Group (NMG) located in Dallas, Texas, has warned millions of their worldwide clients about their online accounts being susceptible to a major data breach. The impacted customers have reached over 4.6 million people, of which they have sent notifications regarding the attack that may have begun by May last year.  From the...
Continue Reading
GSS European call centre provider unreachable ransomware attack

GSS, a European call centre provider, has been unreachable due to ransomware attack

One of Europe’s largest customer care and call centre providers, GSS, has undergone a devastating ransomware attack resulting in a massive freeze in its IT systems and has halted call centre services across its Spanish-speaking customer base. GSS is also a Spanish and Latin America division of the Covisian firm. This week, many call centres and...
Continue Reading
Double chats scheme unveiled REvil Ransomware gang cheat partners dark web

Double chats scheme unveiled by REvil Ransomware gang to cheat on partners

REvil, a private ransomware-as-a-service (RaaS) group from Russia, has reportedly come back to its operations intending to cheat on its affiliates. According to reports made by security researchers, the ransomware gang cheats on its partners so they will be able to rob all ransom payments from their victims.  The operators of the REvil RaaS were...
Continue Reading
300k Subdomains exploited Phishing-as-a-Service Scam phishing attack

300,000 Subdomains gets exploited by a newly discovered Phishing-as-a-Service Scam

Microsoft reported a newly found Phishing-as-a-Service operation last Tuesday, which has used a high-volume 300,000 distinct and newly created subdomains that are operated in a single run. According to the tech giant, they discovered the campaign amid their research about phishing attacks triggered by the phishing-as-a-service operation named BulletProofLink. The procedure is reported to be offering low-cost domain hosting,...
Continue Reading
1 2 3 4 27